Please turn on your JavaScript for this page to function normally.
How Linux Foundation sysadmins secure their workstations

Sysadmins around the world have been provided with another helpful guide on how to go about hardening their Linux workstations, as Konstantin Ryabitsev, Director of …

Over 225,000 Apple accounts compromised via iOS malware

“Researchers from Palo Alto Networks and China-based WeipTech have unearthed a scheme that resulted in the largest known Apple account theft caused by malware. All in …

Spotting malicious apps on Android markets just got easier

“Spotting malicious apps before they are offered for download and/or removing them is a tough challenge for every online Android app marketplace, including Google Play, …

cloud binary
Cloud Storage Security, A Practical Guide

Authors: Aaron Wheeler and Michael WinburnPages: 144 pagesPublisher: ElsevierISBN: 0128029307 Introduction Practically everybody keeps at least some of their data in the …

UDP-based Portmap latest target for DDoS attackers looking to amplify attacks

US-based carrier and global backbone operator Level 3 has spotted a new vector being used for DDoS reflection attacks: Portmapper (or simply Portmap). The Portmap service …

Security flaws could allow attackers to steal over 100 different cars

Since 2012, a trio of European researchers knew that the Megamos Crypto transponder – used in a over 100 cars manufactured by Audi, Ferrari, Fiat, Cadillac, Volkswagen …

Payment card info of 93,000 Web.com customers stolen

The name, address, and credit card information of approximately 93,000 customers of Web.com, a popular US-based provider of Internet services to small businesses, has been …

Stolen Ashley Madison data dumped online, seems legitimate

As you might have heard by now, some 10 gigabytes of data allegedly stolen in last month’s Ashley Madison hack have been leaked by the attackers on the Dark Web and on …

Microsoft issues emergency patch for IE flaw exploited in the wild

Microsoft has pushed out an emergency out-of-band Internet Explorer update, which fixes a critical memory corruption vulnerability (CVE-2015-2502) that is being actively …

Mozilla is experimenting with improved Private Browsing

Mozilla Foundation is again aiming to boost the privacy of Firefox users, and is beginning to test a new, improved kind of Private Browsing.“All major browsers offer …

Does your mobile carrier track you online?

At least nine mobile carriers around the world are using “supercookies” to track users’ web browsing, a study by human rights organization Access has …

Researcher releases exploit for OS X 0-day that gives root access

Italian security researcher Luca Todesco has published PoC exploit code for a newly discovered zero-day privilege escalation flaw affecting OS X Yosemite (v10.10) and …

Don't miss

Cybersecurity news